Month of May marked with an emergence of May ransomware

May virus is a cyber infection which uses a strong encryption algorithm to render victim’s personal files useless. In the technical terms, it is called ransomware [1]. The chronology of the attack is simple. First, the virus infiltrates computers and runs the encryption process during which it encrypts files using AES-256 and RSA-4096 algorithms and appends them with .locked extensions. The duration of this process may vary depending on the amount of data that is being processed. Then it drops a text file called Restore_your_files.txt on every folder that contains encrypted files. As you can probably guess from its title, this document features all the necessary information about how to restore the data. In particular, the victims are pushed towards paying the criminals 1 Bitcoin [2] and contacting them via decrypt@mayofware.solutions email address for further instructions. The victims are only given 5 days to make the payment. Unfortunately, even when the money is transferred, the criminals rarely get back to the victims. More often, they simply flee with the money, leaving victims to deal with a corrupted system by themselves. Besides, the hackers may program the virus to block antivirus software installed on the device and this way prevent May virus removal. Luckily, there are a few ways to bypass this obstacle, and our experts provide them below this article. You will fix your computer easily by scanning it with a reputable antivirus tool such as Reimage.

If you are wondering how the whole ransom payment process is orchestrated, just take a look at the ransom note this virus leaves on the computer more closely. Here is a transcript of this text file:

You have 5 days for decrypt your files.All your files have been encrypted with May Ransomware.For encrypt we use AES256+RSA4096.Don`t try recover your files.Decrypt instruction!1) Make your bitcoin wallet on block.io or blockchain.info and buy 1 bitcoins on BTC Exchange Sites (https://goo.gl/1PE96T)2) Send 1 bitcoin to address 3Gw6b57A3E34nAph3mzGbKAj8sTSgD8GP93) Write to us on email decrypt@mayofware.solutions . In subject write this identificator “81ff05bf2ab1406d8f11b866e804af37”4) After receive bitcoins and your email , we contact with you.YOU MIGHT DECRYPT 2 FILES FOR FREE. Send it to email decrypt@mayofware.solutions .In Subject ,write your UNIQUE Identificator.

As you can see, the criminals provide each of their victims with a personal identification number. Presumably, the hackers keep all the ID’s in some sort of database next to the unique data decryption keys. That’s why the victims are asked to submit this number along with the payment. Nevertheless, this does not mean that you should. On the opposite, you should avoid getting involved in any type of collaboration with the criminals and take all measures possible to remove May virus from your computer.

Let’s expose some of the ransomware distribution strategies

Typically ransomware creators try to remain very discrete about the ways they distribute their evil products around, to avoid having these malicious networks shut down. Nevertheless, over the years of research, experts have already exposed quite a lot of techniques ransomware developers use to deploy the malicious encryptors on the victim’s computers. We now know that most ransomware travel via malicious spam campaigns. Others rely on deceptive software update advertisements, while the most malicious ones like, say, WannaCry virus apply exploits to brute force their way into systems. May ransomware may not be using the most sophisticated techniques, but like most ransomware, it is always open to various adjustments and modifications. So, you have to be careful and make sure you take all measures to prevent May from accessing computer.

May removal tips:

Don’t be feel intimidated by May removal — it is not as difficult as it sounds. You can fully rely on automatic tools to dispose of the virus for you. Before you launch the full system scan, make sure the software you are using is legally obtained, updated to the latest version and compatible with your operating system. If any antivirus blocking situation occurs — go to the end of this article where you will find instructions on how to decontaminate the virus and regain access to your security utilities. After you remove May virus, start thinking about how are you going to protect your device from similar incidents in the future. We highly recommend that you start making backups of your data.

We might be affiliated with any product we recommend on the site. Full disclosure in our Agreement of Use. By Downloading any provided Anti-spyware software to remove May ransomware virus you agree to our privacy policy and agreement of use.

What to do if failed?
If you failed to remove infection using Reimage, submit a question to our support team and provide as much details as possible.

Reimage is recommended to uninstall May ransomware virus. Free scanner allows you to check whether your PC is infected or not. If you need to remove malware, you have to purchase the licensed version of Reimage malware removal tool. More information about this program can be found in Reimage review.

Log in to your infected account and start the browser. Download Reimage or other legitimate anti-spyware program. Update it before a full system scan and remove malicious files that belong to your ransomware and complete May removal.

If your ransomware is blocking Safe Mode with Networking, try further method.

Get back access to the files encrypted by May using DataRecoveryPro

DataRecoveryPro is a true lifesaver for those, who want to recover their files quickly, but don’t have time or right skills for that. Check out these easy steps below and learn how to use DataRecoveryPro:

Follow the steps of Data Recovery Setup and install the program on your computer;

Launch it and scan your computer for files encrypted by May ransomware;

Restore them.

Make use of the Windows Previous Versions feature and recover your files

Here is how you can useWindows Previous Versions feature only if you have the System Restore function enabled on your computer.

Find an encrypted file you need to restore and right-click on it;

Select “Properties” and go to “Previous versions” tab;

Here, check each of available copies of the file in “Folder versions”. You should select the version you want to recover and click “Restore”.

Try out the benefits of ShadowExplorer:

The instructions below will show how to use ShadowExplorer and recover files using the Volume Shadow Copies saved on the computer. Please keep in mind that this recovery method may not be effective if the virus destroys these copies.